TW200834441A - A method of managing number of views, a security processor, and a terminal for performing the method - Google Patents
A method of managing number of views, a security processor, and a terminal for performing the method Download PDFInfo
- Publication number
- TW200834441A TW200834441A TW096146796A TW96146796A TW200834441A TW 200834441 A TW200834441 A TW 200834441A TW 096146796 A TW096146796 A TW 096146796A TW 96146796 A TW96146796 A TW 96146796A TW 200834441 A TW200834441 A TW 200834441A
- Authority
- TW
- Taiwan
- Prior art keywords
- audiovisual content
- views
- content
- segment
- license
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 57
- 230000015654 memory Effects 0.000 claims description 13
- 238000007726 management method Methods 0.000 claims description 11
- 230000006870 function Effects 0.000 claims description 9
- 238000012545 processing Methods 0.000 claims description 9
- 230000008569 process Effects 0.000 claims description 6
- 238000012795 verification Methods 0.000 claims description 4
- 238000004364 calculation method Methods 0.000 claims description 3
- 238000013500 data storage Methods 0.000 claims description 2
- 230000003247 decreasing effect Effects 0.000 claims description 2
- 238000010586 diagram Methods 0.000 description 11
- 230000000007 visual effect Effects 0.000 description 6
- 230000004888 barrier function Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 3
- 238000012544 monitoring process Methods 0.000 description 3
- 230000004044 response Effects 0.000 description 3
- 101150063504 CAN2 gene Proteins 0.000 description 1
- 241000270666 Testudines Species 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 238000012899 de-mixing Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000012634 fragment Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 210000001331 nose Anatomy 0.000 description 1
- 230000008092 positive effect Effects 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/167—Systems rendering the television signal unintelligible and subsequently intelligible
- H04N7/1675—Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00166—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised contents recorded on or reproduced from a record carrier, e.g. music or software
- G11B20/00181—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised contents recorded on or reproduced from a record carrier, e.g. music or software using a content identifier, e.g. an international standard recording code [ISRC] or a digital object identifier [DOI]
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/00746—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
- G11B20/00797—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of times a content can be reproduced, e.g. using playback counters
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/00847—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction is defined by a licence file
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/238—Interfacing the downstream path of the transmission network, e.g. adapting the transmission rate of a video stream to network bandwidth; Processing of multiplex streams
- H04N21/2389—Multiplex stream processing, e.g. multiplex stream encrypting
- H04N21/23895—Multiplex stream processing, e.g. multiplex stream encrypting involving multiplex stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/266—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
- H04N21/26606—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing entitlement messages, e.g. Entitlement Control Message [ECM] or Entitlement Management Message [EMM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/414—Specialised client platforms, e.g. receiver in car or embedded in a mobile appliance
- H04N21/4147—PVR [Personal Video Recorder]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/438—Interfacing the downstream path of the transmission network originating from a server, e.g. retrieving encoded video stream packets from an IP network
- H04N21/4385—Multiplex stream processing, e.g. multiplex stream decrypting
- H04N21/43853—Multiplex stream processing, e.g. multiplex stream decrypting involving multiplex stream decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4405—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4623—Processing of entitlement messages, e.g. ECM [Entitlement Control Message] or EMM [Entitlement Management Message]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4627—Rights management associated to the content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
- H04N21/8355—Generation of protective data, e.g. certificates involving usage data, e.g. number of copies or viewings allowed
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/845—Structuring of content, e.g. decomposing content into time segments
- H04N21/8456—Structuring of content, e.g. decomposing content into time segments by decomposing the content in the time domain, e.g. in time segments
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
Description
200834441 九、發明說明: 【發明所屬之技術領域】 發明領域 本發明係有關於一種管理觀看次數之方法、一保全處 ‘ 5理器和一用以執行該方法之終端機。 . 【先前技術】 發明背景 « 用以管理視聽内容之觀看次數的方法存在。透過範 例’此專方法包含: 1〇 •提供紀錄於一資料儲存媒體上之一數位視聽内容, 该内容係被細分成為多數自動地依照一規定順序被讀取取 之連續時間片段; •提供該視聽内容之一被允許觀看次數; •透過龟子躓取器裝置讀取被記錄視聽内容,特定 15地,該電子讀取器使在該視聽内容尚未抵達結尾之前,往 ^ 回跳躍去讀取一較早時間片段成為可能; • •計算該視聽内容之已發生觀看次數;以及 •备该已發生觀看次數大於或者等於該被允許觀看次 數4,阻止該視聽内容之任何更進一步地觀看,否則,允 2〇許整個視聽内容再次被觀看。 經由範例,該數位視聽内容可為諸如電影之視訊圖像 (videograms)或者一電視廣播。 一片段相應至一串具順序且連續的圖像和/或聲音。 該片段係以適合被電子讀取器讀取然後在螢幕上被觀看的 5 200834441 形式記錄。在螢幕上觀看期間,一片段的圖像和聲音在大 於或者等於50赫茲(Hz)之一頻率上彼此跟隨,以便在一 斗寸疋片奴中的該等各式圖像與聲音之間,建立針對視覺和 聽覺連續性的效果。 若當依照規定順序讀取二片段時,在先前片段停止被 播放的瞬間與在隨後片段開始被播放的瞬間之間的時間差 不到1/50秒的話’此二片段會被視為連續的。因此,杏一 田 - 片奴疋連績的,對於使用者而言,在此二片段之間的視覺 和聽覺連續性係被確保的。 10 15 20 這種f理方式在限制一使用者能夠觀看一被記錄視聽 内各之次數上是特別有用的。 、結至目前為止,應該被觀察到的是,該視聽内容可以 破硯看次數錢過計算該制者已轉看該視覺内容的次 數來被限制。此第-種方法應該要與_並行第二方法區 ,’該第二方法同樣地尋求要去限制該内容可被觀看次 。此並行方法最初會允許-觀看期間dva。此後,該期 ^VA係按賤視聽内容已經被觀看之_長度的比例被 减額(element)。此並行方法係簡單的,因為它足以測量 規看時間。但是它不夠靈活,而且 如曰 尤其是它很難透過僅僅 ’ Ϊ已消逝觀看時間的總額去考廣劍T .^ 心司不同種觀看視聽内容 万式的可能,這些可能包括藉由往 ^ 彳回桃躍,或者相反地往 則祧躍,其中跳躍可在使用者控制下被執^一 潛在地,記數該視聽内容已奴〈站^ f ^ 、、工破硯看次數避免了該並 仃方法的缺點。但是,因為有可能分 K主回跳躍,且或許也有 6 200834441 ^ 5 可能往前跳躍,有許多不同的策略可以被使用來計算已發 生的觀看次數。 舉例而言,一旦該視聽内容的每一個片段都已經被觀 看至少一次時,該視聽内容可被決定為已經被觀看一次 了。這個策略是非常寬容的,因為它致能該使用者藉由當 某個特定片段每次被觀看完畢時一再往回跳躍,來隨其所 欲地觀看該片段無限次。 一種些許較不寬容的策略包括:當每次該視覺内容之 一片段被觀看時,增額(increment) —計數。該計數接著 10 係被與一預定臨界值相比較。如果超過該臨界值的話,已 發生觀看次數會被增額一次。依照此策略,該使用者不再 可以在被考慮之觀看次數沒有被增額的情況下,隨其所欲 地觀看一特定片段無限次。然而,相反地,已發生的觀看 次數結果可能被增額,即使其中一些片段完全沒有被觀看 15 • 過。 因此,提出一種管理觀看次數之方法是合乎需求的, 該方法要足夠靈活,以使用以計算已發生觀看次數之新策 略被實現而不會導致該方法之重大修改。 【發明内容3 20 發明概要 本發明試圖滿足這個期望。因此,本發明提供一種管 理一有次序視聽内容之觀看次數的方法,該方法包括: •提供一表格,其包含與時間片段數量相當之單格 (cell),每一單格係以一對一的模式與該視聽内容之各別 7 200834441 片1 又相連繫,每一單格都適用於包含一數字; •當視聽内容之一片段被該電子閱讀器讀取時,將包 各在與該片段相關聯之單格中的數字增额或降額一預定級 距(step);以及 _ 5 •根據儲存在該表格知每一單格中的數字,計算已發 . 生之觀看次數。 在上述方法中,該表格使儲存視聽内容每一片段已被 φ 觀看之次數的代表成為可能。特定地,該表格之内容亦可 計鼻倒帶。包含在該表格中之資訊的顆粒性(granularity) 1〇因此係足以實施大量各種不同的策略,來計算已發生之觀 看次數。此方法因此係足夠靈活來致能視聽内容的每一操 作者或提供者去定義他們自己用來計算已發生之觀看次數 的策略。 〜 雖然如此,假若在計算策略方面有一變化,需要變更 的,、有.十异已發生之觀看次數的方式和/或該增額或減額 ㉛距的預定尺寸,而且並不需要去修改該管理操作或者該 : 祕的更新。因此,該管理方法需要被提供的更正係被限 制。 此方法之實施可包括下列特性之一或多者: 20 •在一料失性記憶體中儲存—多視許可證,該許可 證至少包含有: •被允許的觀看次數; •該表格,其包含對—的模式與該視聽内 容之各別片段相連繫之該等單格;以及 8 200834441 •密碼冗餘(cryptographic redundancy),其係 使用一密碼鍵( cryptographic key)和上述資料項目每一者 之至少一部份來被實現; •在每一次新使用該閱讀器去觀看該視聽内容之前, 5 驗證該密碼冗餘;以及 •如果該密碼冗餘的驗證失敗的話,防止任何更進一 步的觀看; •該許可證包括一識別符(T—Anti一Reuse ),針對它先 前的使用; 0 •安裝有資訊儲存裝置之一保全處理器,該資訊儲存 裝置包含: •可用來驗證該許可證密碼冗餘之一密碼鍵和 /或可致能該許可證密碼冗餘被實現之一密碼鍵;以及 •該許可證之先前使用的一識別符 15 C Anti Reuse ;200834441 IX. INSTRUCTIONS: [Technical Field of the Invention] Field of the Invention The present invention relates to a method of managing views, a security device, and a terminal for performing the method. [Prior Art] Background of the Invention « A method for managing the number of views of audiovisual content exists. By way of example, this specific method includes: 1) providing a digital audiovisual content recorded on a data storage medium, the content being subdivided into a plurality of consecutive time segments automatically read in a prescribed order; One of the audiovisual content is allowed to be viewed; • The recorded audiovisual content is read through the turtle picker device, and the electronic reader causes the electronic reader to jump to read before the end of the audiovisual content has arrived An earlier time segment is possible; • calculating the number of views that have occurred for the audiovisual content; and • preparing the number of views that have occurred greater than or equal to the number of allowed views 4, preventing any further viewing of the audiovisual content, otherwise , Yun 2 allows the entire audiovisual content to be viewed again. By way of example, the digital audiovisual content can be a videogram such as a movie or a television broadcast. A segment corresponds to a sequence of sequential and continuous images and/or sounds. The clip is recorded in the form of 5 200834441 suitable for reading by an electronic reader and then being viewed on a screen. During viewing on the screen, the images and sounds of a segment follow each other at a frequency greater than or equal to 50 Hertz (Hz), such that between the various images and sounds in a slap in the slap. Establish effects for visual and auditory continuity. If the two segments are read in the prescribed order, the time difference between the instant at which the previous segment stops being played and the instant at which the subsequent segment starts being played is less than 1/50 second, and the two segments are regarded as continuous. Therefore, for the user, the visual and auditory continuity between the two segments is ensured for the user. 10 15 20 This method is particularly useful in limiting the number of times a user can view a recorded audiovisual. So far, it should be observed that the audiovisual content can be broken by the number of times the money has been calculated to count the number of times the viewer has turned to the visual content. This first method should be parallel to the second method area, and the second method likewise seeks to limit the content to be viewed. This parallel method will initially allow - viewing during the dva. Thereafter, the period ^VA is deducted from the proportion of the length of the audiovisual content that has been viewed. This parallel method is simple because it is sufficient to measure the viewing time. However, it is not flexible enough, and especially if it is difficult to see the wide range of audiovisual content by simply measuring the total amount of time that has disappeared, it may include the possibility of watching audiovisual content. Go back to Tao Yue, or vice versa, where the jump can be executed under the control of the user, and the number of the audiovisual content is counted as a slave, and the number of times is avoided. The shortcomings of the 仃 method. However, because it is possible to split the K main jump, and perhaps there may be 6 200834441 ^ 5 may jump forward, there are many different strategies that can be used to calculate the number of views that have occurred. For example, once each segment of the audiovisual content has been viewed at least once, the audiovisual content can be determined to have been viewed once. This strategy is very tolerant because it enables the user to watch the clip indefinitely as he or she wants to jump back and forth each time a particular clip is viewed. A somewhat less tolerant strategy involves incrementing-counting each time a segment of the visual content is viewed. The count is then 10 compared to a predetermined threshold. If the threshold is exceeded, the number of views that have occurred will be incremented. According to this strategy, the user can no longer watch a particular segment as many times as desired without the increased number of views being considered. However, conversely, the number of views that have occurred may be increased, even if some of the segments are not viewed at all. Therefore, it is desirable to propose a method of managing the number of views that is flexible enough to be implemented using a new strategy for calculating the number of views that have occurred without causing significant modifications to the method. SUMMARY OF THE INVENTION 3 20 SUMMARY OF THE INVENTION The present invention seeks to satisfy this expectation. Accordingly, the present invention provides a method of managing the number of views of an ordered audiovisual content, the method comprising: • providing a table containing a number of cells corresponding to the number of time segments, each of the cells being one to one The mode is connected to the audiovisual content 7 200834441 slice 1 , each cell is suitable for containing a number; • when a segment of the audiovisual content is read by the e-reader, the package is The increment or decrement of the number in the cell associated with the segment is a predetermined step; and _ 5 • The number of views that have been generated is calculated based on the number stored in each cell of the table. In the above method, the table makes it possible to store a representation of the number of times each segment of the audiovisual content has been viewed by φ. Specifically, the contents of the form can also be reversed. The granularity of the information contained in the table is therefore sufficient to implement a large number of different strategies to calculate the number of views that have occurred. This method is therefore flexible enough to enable each operator or provider of audiovisual content to define their own strategy for calculating the number of views that have occurred. ~ However, if there is a change in the calculation strategy, there is a need to change, there are ten ways to view the number of views and/or the predetermined size of the increase or decrease of 31, and there is no need to modify the management. Operation or the: Secret update. Therefore, the correction method that this management method needs to be provided is limited. Implementation of this method may include one or more of the following characteristics: 20 • Storage in a lost memory - a multi-view license that includes at least: • the number of views allowed; • the form, a cell comprising a pair of patterns associated with respective segments of the audiovisual content; and 8 200834441 • cryptographic redundancy, which uses a cryptographic key and each of the above data items At least a portion of which is implemented; • verifying the password redundancy each time the reader is newly used to view the audiovisual content; and • preventing any further viewing if the verification of the redundancy of the password fails • The license includes an identifier (T-Anti-Reuse) for its previous use; 0 • One of the information storage devices is installed to hold the processor, the information storage device contains: • Can be used to verify the license password One of the redundant cryptographic keys and/or one of the cryptographic keys that enables the license password redundancy to be implemented; and • an identifier previously used by the license 1 5 C Anti Reuse ;
•在每一次使用該讀取器去觀看該視聽内容之後,該 識別符T—Anti—Reuse和C—Anti—Reuse係被修改,已使它們各 自的新的數值相符合;而 •在每一次重新使用該讀取器去觀看該視聽内容之 20前’只有當該識別符τ一 Anti_Reuse的數值對應到該識別符 C—Anti一Reuse的數值時,該視聽内容之觀看才會被批准; •這種方法包括針對計算已發生觀看次數選擇一運演 算法,當計算觀看次數時,該運演算法係被執行為該許可 證内容之函數,該運演算法係被選擇自一組多數不同可被 9 200834441 執行的叶鼻運漁鼻法’如果兩個運管 1U —料針對該表格之方 早格内容會產生不同結果的事實在 … ’貝存在,則該二計算運演算 法係被視為不同; •提供多數不同視聽内容和多數許可證up -5 „ —視聽内容識別符,該視聽内容識別符如一對一的 • 模式與該等視聽内容之單一者相連繫;以及 .當計算已發生之觀看錢時,只有特定資訊會被使 • 絲=算已發生的觀看次數,該特定資訊係被包含在包含 有目前被讀取視聽内容之識別符的許可證中; 10 •提供—保全處理11,其係適用於處理權利控制信息 (entitlement control message (ECM))以及權利管理訊: (entitlement management messages (EMM)).並且 •以一權利管理訊息之形式將該許可證傳送至該保全 處理器,該權利管理訊息包含它被傳送至的唯_保全處理 15 器之識別符; •該視聽内容的不同片段係被拌碼(scramble)著不同 : 控制字眼,針對每一片段該方法包括有: •傳送至少一權利控制信息至一保全處理器,每一權 利控制信息包含: 20 •為了解拌(descramble)該視覺内容之該片 對一部分所需要之該控制字眼的密碼;以及 •一識別符,其係對應到··當該權利控制信息 被使用來取得用以解拌該視覺内容之該片段所需的控制字 眼時,將會被增額或減額的該表格之該方單格; 200834441 •將包含在該單格中之號碼增額或者減額,該單格係 對應至包含在該權利控制信息中的該識別符; •該保全處理器解碼包含在該被傳送權利控制传幸中 之該控制字眼;以及 •傳送該被解碼控制字眼至一解拌器,以解摔該視聽 内容之該片段的至少一部份; •計算已發生觀看次數包括: •判疋自該視聽内谷上一次被觀看起,包含已 被增額或者減額之一數值的該表格之單格的總數;以及 • δ十异已發生的觀看次數為該判定結果的一函 數,而 •當計算已發生觀看次數時,用於增額或者減額包含 在與一片段相連繫之該單格中之數字的該預定級距係以一 函數減少或者增加,該函數係該片段已被觀看之次數。 這種方法之上述實施自呈現了下列優勢: •在一簽署許可證中保留計算已發生觀看次數所需之 資訊使得偽造此資訊非常困難; •比較該等識別符T—Anti—Reuse和C—Anti—Reuse防止 一許可證被重新初始化而進入一先前狀態; •選擇不同用於計算已發生觀看次數之運演算法的可 能性使得使用不同用以監控各種視聽内容之觀看次數的策 略成為可能; •在每一許可證中使用一視聽内容識別符使得獨立管 理該等視聽内容之觀看次數的計算成為可能; 11 200834441 •以一權利管理訊息的形式傳輸該許可證限制需要對 該保全處理器做的適配,該適配使該保全處理器能夠接收 並且處理該許可證; •該表袼即將在包含該控制字密碼之該權利控制信息 5中被增額或減額之單格識別符的存在大大地替該保全處理 器間化了該表格的管哩; •以在該視聽内容上次被觀看起該表格被修改過的單 袼數量之一函數來增額已發生觀看次數使其得以考慮該視 聽内容已被觀看過的比例,以對已發生觀看次數的增額或 1〇 者減額;以及 •改變增額或者減概距之尺寸作為該諸已被觀看 之次數的函數使其得以對一片段之第一次觀看和同一片段 之隨後觀看分配不同程度的重要性。 本發明也提供一種保全處理器,其包含指示,用以在 15該等指示被一電子計算機執行時執行上述管理方法。 最後,本發明也提供一種終端機,用以讀取一視聽内 容,該終端機包含: •一資料記錄媒體,其包含該被記錄數位視聽内容, 該内容係被細分成多數連續時間片段,用來以一預定順序 20自動讀取; •該視聽内容被允許觀看之一整數次數; .-視聽内容電子閱讀器,其特定地可往回跳躍,以 在抵達該視聽内容結尾之前,讀取一較早片段· •終端機係適於: 12 200834441 •計算該視聽内容已發生之觀看次數;以及 •如果已發生觀看次數大於或者等於被允許之 觀看次數的話,防止該視聽内容之任何新觀看,否則允許 該視聽内容整個的新觀看; 5 •該終端機接著包括一表格,其包含與時間片段數量 相當的單格,每一單袼係以一對一的方式與該視聽内容之 一各別片段相關聯,每一單格係適用於包含一數字,而且 •該終端機係適於: •當該多媒體内容之一片段係被該電子閱讀器 10閱讀時,用於對包含在與該片段相關聯之單格中的數字, 以一預定級距增額或者減額;以及 •用以基於儲存在該表格每一單格中的數字, 計算已發生之觀看次數。 圖式簡單說明 15 本發明在閱讀下文描述後可更容易地被理解理,下文 係以完全非限制性範例的方式呈現,並且係參照圖式而 為,其中: 第1圖係一圖式,其顯示用以讀取被記錄數位視聽内容 之一終端機; 20 第2圖係一圖式,其代表可使用第1圖之該終端機被觀 看之視聽内容; 第3圖係一圖式,其代表與第2圖之該視聽内容一起被 5己錄之一權利控制信息(ECM); 第4圖係一圖式,其代表使用在第1圖之終端機中的一 13 200834441 許可證; 第5圖代表包含在第4圖許可證中的―表 .第6圖代表包含在第1圖終端機之1全處理哭中的一 Anti—Reuse列表; 时中的 第7A圖和第 之流以管理該視聽内容已被觀看之次數; 弟8圖係一圖式,其代表一唯一位 ⑽M-U)之架構,其係由第娜息執行期間所產二 以及 10 第9圖至第11圖係流程圖,各別代表三個演算法,1 係用於計算已發生之觀看次數。 /、 等 t實施方式】 較佳實施例之詳細說明 在圖式中,相同的標號用來指明相同的元件。 15 在下文描述中,已為熟知此項技藝者熟知的特性和功• After each use of the reader to view the audiovisual content, the identifiers T-Anti-Reuse and C-Anti-Reuse are modified to match their respective new values; and • at each time Reusing the reader to view the audiovisual content before the 'only when the value of the identifier τ_Anti_Reuse corresponds to the value of the identifier C-Anti-Reuse, the viewing of the audiovisual content will be approved; The method includes selecting an algorithm for calculating the number of views that have occurred. When calculating the number of views, the algorithm is executed as a function of the license content, and the algorithm is selected from a group of different The fact that the two noses are 1U, which is produced by 9 200834441, will produce different results for the early content of the table. In the case of 'Bei, the second computing algorithm is regarded as Different; • provide most different audiovisual content and most licenses up -5 „ — audiovisual content identifiers, the audiovisual content identifiers such as one-to-one • mode and the single of the audiovisual content And; when calculating the amount of money that has occurred, only certain information will be asked to count the number of views that have occurred, and that particular information is included in the license containing the identifier of the currently read audiovisual content. 10 • Provision-to-hold processing 11, which applies to the entitlement control message (ECM) and entitlement management messages (EMM). and • in the form of a rights management message The license is transmitted to the security processor, and the rights management message includes an identifier of the only device that is transmitted to it; • different segments of the audiovisual content are scrambled differently: control word, The method for each of the segments includes: • transmitting at least one rights control message to a security processor, each rights control information comprising: • • the control needed to understand a portion of the slice of the visual content for descramble a password for the word; and an identifier corresponding to the object when the right control information is used to retrieve the visual content The square of the form that will be incremented or deducted when the control word required for the segment is increased; 200834441 • The number of the number included in the single box is increased or decremented, and the single cell corresponds to The identifier in the rights control information; the security processor decodes the control word included in the transmitted rights control; and • transmits the decoded control word to a descrambler to resolve the audiovisual At least a portion of the segment of content; • Calculating the number of views that have occurred includes: • Judging from the total number of cells in the table that have been incremented or decremented since the last time the view was viewed. And • the number of views that have occurred δ is a function of the result of the decision, and • when calculating the number of views that have occurred, the increment or deduction is included in the number in the cell associated with a segment. The predetermined pitch is reduced or increased by a function that is the number of times the segment has been viewed. The above implementation of this method presents the following advantages: • Retaining the information needed to calculate the number of views that have occurred in a signed license makes it very difficult to falsify this information; • Compare the identifiers T-Anti-Reuse and C- Anti-Reuse prevents a license from being reinitialized into a previous state; • the possibility of selecting different algorithms for calculating the number of views that have occurred has made it possible to use different strategies for monitoring the number of views of various audiovisual content; • The use of an audiovisual content identifier in each license makes it possible to independently manage the viewing times of such audiovisual content; 11 200834441 • Transferring the license limit in the form of a rights management message requires the security processor to be done Adaptation that enables the security processor to receive and process the license; • the presence of a single identifier that is to be incremented or decremented in the entitlement control information 5 containing the control word password Greatly interpolating the rules of the form for the security processor; • to see when the audiovisual content was last viewed The form has been modified by one of the number of single-numbered functions to increase the number of views that have occurred to allow consideration of the proportion of the audiovisual content that has been viewed, in order to increase the number of views that have occurred or to reduce the number of viewers; and • change The size of the increment or subtraction is used as a function of the number of times the viewer has been viewed to assign different degrees of importance to the first viewing of a segment and the subsequent viewing of the same segment. The present invention also provides a security processor including instructions for performing the above-described management method when the instructions are executed by an electronic computer. Finally, the present invention also provides a terminal for reading an audiovisual content, the terminal comprising: • a data recording medium containing the recorded digital audiovisual content, the content is subdivided into a plurality of consecutive time segments, To automatically read in a predetermined order 20; • the audiovisual content is allowed to view an integer number of times; .- audiovisual content e-reader, which can specifically jump back to read a read before the end of the audiovisual content Earlier clips • • Terminals are suitable for: 12 200834441 • Calculate the number of views that have occurred for the audiovisual content; and • Prevent any new viewing of the audiovisual content if the number of views has been greater than or equal to the number of allowed views, Otherwise allowing the entire new viewing of the audiovisual content; 5 • The terminal then includes a form containing a number of cells corresponding to the number of time segments, each of which is in a one-to-one manner and one of the audiovisual content Fragments are associated, each single cell is adapted to contain a number, and • the terminal is adapted to: • when one of the multimedia content When the segment is read by the e-reader 10, it is used to increment or decrement the number contained in the cell associated with the segment by a predetermined level; and • to use each table stored in the table based on The number in the grid, which counts the number of views that have occurred. BRIEF DESCRIPTION OF THE DRAWINGS The present invention will be more readily understood from the following description, which is presented by way of a non-limiting example, It displays a terminal for reading the recorded digital audiovisual content; 20 Fig. 2 is a diagram representing the audiovisual content that can be viewed by the terminal of Fig. 1; Fig. 3 is a diagram, It represents one of the rights control information (ECM) recorded with the audiovisual content of FIG. 2; FIG. 4 is a diagram representing a 13 200834441 license used in the terminal of FIG. 1; Figure 5 represents the "table" included in the license of Figure 4. Figure 6 represents an Anti-Reuse list contained in the 1st processing cry of the terminal of Figure 1; Figure 7A and the stream of time To manage the number of times the audiovisual content has been viewed; the brother 8 is a diagram representing a unique (10) M-U structure, which is produced during the execution of the Dinar, and 10, 9th through 11th Diagram flow chart, each representing three algorithms, 1 is used to calculate the number of views that have occurred . DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS In the drawings, the same reference numerals are used to refer to the same elements. 15 In the following description, features and work well known to those skilled in the art have been known.
能並不會被詳細描述。 第1圖顯示一終端機2,其係用以讀取數位視聽内容。 S終‘機2係適用於引發一螢幕4去顯示被讀取之視聽内 容,此顯示乃以一種致能該視聽内容可被一使用者觀看之 20方式呈現。「使用者」這個名詞在此是被用來意味一人類。 藉由一範例,該螢幕4通常是一電視螢幕。 該終端機2包括一解碼器6,其係被連接至一資料記錄 媒體8。例如,藉由在此範例中的說明,二視聽内容CANi 和CAN2以及它們各自的許可證]^和1^是被記錄於該媒體 14 200834441 8。藉由範例,該等内容係在控制字CW之幫 助下被拌碼的視聽内容。 此等視聽内容之一者的架構係被顯示於第2圖中。 該視聽内容係被細分割成多個時間片段CAN_1至 5 CAN—N。此等片段CAN_i以一被指定的順序彼此接續。舉Can not be described in detail. Figure 1 shows a terminal 2 for reading digital audiovisual content. The S final 'machine 2' is adapted to cause a screen 4 to display the viewed audiovisual content, the display being presented in a manner that enables the audiovisual content to be viewed by a user. The term "user" is used here to mean a human being. By way of an example, the screen 4 is typically a television screen. The terminal 2 includes a decoder 6 which is connected to a data recording medium 8. For example, by way of illustration in this example, the two audiovisual content CANi and CAN2 and their respective licenses ^^ and 1^ are recorded on the media 14 200834441 8. By way of example, the content is an audiovisual content that is mixed with the help of the control word CW. The architecture of one of these audiovisual content is shown in Figure 2. The audiovisual content is finely divided into a plurality of time segments CAN_1 to 5 CAN-N. These segments CAN_i are connected to each other in a specified order. Lift
例而言,該片段CAN_1對應至將被讀取的第一個片段,而 片段CAN_N對應至將被讀取的最後一個片段。在這個範例 中,每個片段CAN_i係使用一單一控制字CW被拌碼,此控 制字CW不同於使用來拌碼先前或者之後的片段者。因此, 10在此特定實施例中,每一片段對應至一密碼週期 (cryptoperiod ) ° 藉由範例,密碼週期之持續時間一般是1〇秒鐘。 密碼週期之每一片段CANj係被連繫至一權利控制訊 息(ECM),其係被寫作ECM一丨。該訊息ECMj包含使用來 15拌碼該片段CAN—i之控制字(::臀的一密碼cw*。該訊息 ECM—1係與該等片段CAN」同時被記錄在該媒體8上。 藉由乾例,此等訊息ECM—i之架構遵循㈣C9〇_〇〇7 標準「數位廣播系統之有條件存取系統(Conditions access 2〇 f〇T dl§ltal broadcast systems)j> 、過諸如衛星的網路之遠距離資料傳輸網路來傳輸拌 碼多媒體信號的領域。 ♦;里解下文描述有幫助之該ECM_i 訊息架構的那些片段有 — Ί λ 有被”、員不。該訊息ECMj包括攔位 (field) S0ID,其包含— 各廣播该視聽内容之操作者的一個識 15 200834441 別符以及將被使用之該岔碼上下文(cryptographic context) 的一個識別符。將被使用之該密碼上下文的該識別符特別 係用來致能一保全處理器去識別哪一個(些)密碼鍵應被 使用於處理該ECM訊息。 5 該訊息ECM_i也包括: •一欄位C—Id,其包含一表格中之一單格(ceu)的一 識別符C_Id ; •一攔位CW*,其包含一控制字cw之該密碼CW* ; •一欄位CdA,其包含該視聽内容之存取條件cdA; 10 以及 •一攔位ECM_R,其包含密碼冗餘,諸如一訊息鑑別 碼(MAC)或者該訊息ECMj之一密碼簽名,該密碼簽名 係有關於包含在該訊息ECM__i之每一先前單格中之資料的 一部分。 15 該識別符C_Id在該訊息ECM j和第5圖表格中的一單 格之間建立一種一對一的關係。 藉由範例,該等許可證1^和乙2具有表示於第4圖中之許 可證架構。更確切地,每一許可證包括下列欄位: •一攔位S0ID具有相同於對應至該許可證之該視聽 20内容之該連繫訊息ECM—i中之攔位S0ID的内容; •一攔位UA,其包含一保全處理器之一獨特識別符 UA ; •一攔位Content_Id,其包含與該許可證對應之該視聽 内容的一識別符Content Id; 16 200834441 • 一欄位L一Id,其包含該許可證之一識別符L_Id,該 識別符L_Id特別是用來致能該許可證去與另一包含完全相 同的識別符SOID、UA和Contentjd之許可證區別開來; •一欄位NVA,其包含對應於該視聽内容被許可閱讀 5的次數之一正整數NVA,該視聽内容係被該識別符 Contentjd所識別者; •一欄位NCV,其包含一整數NCV,該整數NCV係被 使用來儲存在與該許可證連繫之該視聽内容先前被讀取時 已經被觀看之片段號碼; 10 •一攔位T—Anti-Reuse,其包含該許可證之前次使用 的一識別符T—Anti—Reuse,用來保證同一許可證不能被重 複使用多次;通常這個識別符係一數值的數字,其僅僅在 該許可證之每一新使用才會提高; •一欄位Params,其包含一演算法之各種參數,用以 15已發生觀看次數; •一攔位Tab,其包含第5圖之表格;以及 •一攔位L—R,其包含諸如一MAC之密碼冗餘r, 或=包含在上述欄位每—者中之資訊的至少—部分相關 之一密碼簽名(cryptographic signature )。 2〇 經由範例,該欄位Params包含針對下列參數之數值: • 尺寸; • S!; • S2 ;以及 • Algo Id 〇 17 200834441 這些參數之目的係參照第9至11圖描述如下。 該密碼冗餘L—R係藉由實施—密碼演算法 (ciyptogmphical alg0rithm)和一密碼鍵而被構成。 第5圖係可被使用於該表格Tab之—架構範例之圖式。 5在此範例中,該表格係由N個連續單格所構成,該等單格係 被歸類為!卿。N係—整數,其等於包含在與該許可證相 關聯之該視聽内容中的片段數目。每一單格作用來包含一 數字,其係由-些位元所編碼,可藉由使用包含在該許可 證之該欄位Params中的該參數c—Size來被設定。 1〇 上文中針對该等單格之每一者所指出的該等數值1、 2、3'"、1、1+卜〜、:^代表該識別符(:;—;^之數值,其 係作用來認定位於緊接下方之單袼。 該解碼器6包含: •一電子碩取器10,其適用來讀取以及寫入資料至該 15 媒體8 ; •一濾波1§ 12,其適用於將該被拌碼視聽内容轉給一 解拌碼為和-解碼器Η,以及傳送與該被拌碼視聽内容相 關聯之該訊息ECM—I至一解碼器7卡片界面16 ;以及 •一解拌碼器和解碼器14。 2〇 純粹作為不意用,在此範例中,該解碼器6包含一接收 器,其適用於透過-無線資料傳輸網路2〇,接收被拌碼 視聽内容和與該視聽内容相關聯之該等ECM訊息。例如, 該被拌碼視聽内容和該等ECM訊息係被一 遠端傳輪器24傳 播至諸如該終端機2之眾多遠端終端機。 18 200834441 終端機2也具有一保全處理器30 ’其係被連接至該解碼 器6。此保全處理器30係被設計來處理該等ECM訊息和 EMM訊息(權利管理訊息)’以及去執行該終端機2之操作 所需要之編碼和解碼操作。 5 為了這目的,該處理器30包含: •一界面32,適用於與該解碼器之該界面16合作,以 自其接收ECM和EMM訊息; •一計算機34,適用於處理透過該界面32接收之該等 EMM和ECM訊息; 10 • —非易失性記憶體36,其中亦儲存有該等編碼/解 碼操作所需之資料的各種項目;以及 •一易失性記憶體38,暫時處理結果係被儲存到那。 舉例而言,該處理器30是諸如一智慧卡之一移動式處 理器。 15 該記憶體36包含:For example, the segment CAN_1 corresponds to the first segment to be read, and the segment CAN_N corresponds to the last segment to be read. In this example, each segment CAN_i is coded using a single control word CW, which is different from the segment used to mix the previous or subsequent segments. Thus, in this particular embodiment, each segment corresponds to a cryptoperiod. By way of example, the duration of the crypto period is typically 1 sec. Each segment of the crypto period CANj is linked to an Entitlement Control Message (ECM), which is written as an ECM. The message ECMj includes a control word (:: a password cw* of the hips. The message ECM-1 is associated with the segments CAN) is recorded on the medium 8 by using the control word of the segment CAN_i. For example, the architecture of these messages ECM-i follows (4) C9〇_〇〇7 standard "Conditions access 2〇f〇T dl§ltal broadcast systemsj", such as satellite The long-distance data transmission network of the network transmits the field of mixed-code multimedia signals. ♦; The following descriptions of the ECM_i message architecture that are helpful are: Ί λ has been ”, the staff does not. The message ECMj includes Field S0ID, which contains - an identifier of each operator who broadcasts the audiovisual content 15 200834441 and an identifier of the cryptographic context to be used. The cryptographic context to be used The identifier is specifically used to enable a security processor to identify which cryptographic key(s) should be used to process the ECM message. 5 The message ECM_i also includes: • A field C-Id containing a table One of An identifier C_Id of a single cell (ceu); • a CW*, a password CW* containing a control word cw; • a field CdA containing the access condition cDA of the audiovisual content; 10 and An intercept ECM_R containing a cryptographic redundancy, such as a message authentication code (MAC) or a cryptographic signature of the message ECMj, the cryptographic signature being associated with a portion of the information contained in each of the previous cells of the message ECM__i 15 The identifier C_Id establishes a one-to-one relationship between the message ECM j and a single cell in the table of Figure 5. By way of example, the licenses 1 and B have the representations in Figure 4 The license structure in the middle. More specifically, each license includes the following fields: • A barrier S0ID has the same S0ID in the connection message ECM-i corresponding to the content of the audiovisual 20 corresponding to the license. Content; • a barrier UA that contains a unique identifier UA of a security processor; • a barrier Content_Id that contains an identifier of the audiovisual content corresponding to the license Content Id; 16 200834441 • Field L-Id, which contains one of the licenses identified L_Id, the identifier L_Id is used to distinguish the license from another license containing the same identifiers SOID, UA and Contentjd; • a field NVA, which corresponds to the audiovisual One of the number of times the content is permitted to read 5 is a positive integer NVA, the audiovisual content is identified by the identifier Contentjd; • a field NCV containing an integer NCV that is used to store the license The segment number of the audiovisual content that has been viewed when the audiovisual content was previously read; 10 • A T-Anti-Reuse, which contains an identifier T-Anti-Reuse used before the license, Ensure that the same license cannot be reused multiple times; usually this identifier is a numeric number that is only increased for each new use of the license; • One field Params, which contains various parameters of an algorithm For the number of views that have occurred 15; • a block Tab containing the table of Figure 5; and • a block L-R containing a password redundancy r such as a MAC, or = included in the above field Information in each At least - one of the relevant part of the cryptographic signature (cryptographic signature). 2〇 By way of example, this field Params contains values for the following parameters: • Dimensions; • S!; • S2; and • Algo Id 〇 17 200834441 The purpose of these parameters is described below with reference to Figures 9-11. The cryptographic redundancy L-R is constructed by implementing a cryptographic algorithm and a cryptographic key. Figure 5 is a diagram of an architectural example that can be used in the Tab. 5 In this example, the table consists of N consecutive cells, which are classified as ! Qing. N-line - an integer equal to the number of segments included in the audiovisual content associated with the license. Each of the cells acts to contain a number, which is encoded by a number of bits, which can be set by using the parameter c-Size contained in the field Params of the license. 1) The values 1, 2, 3'", 1, 1+b~, :^ indicated above for each of the cells represent the value of the identifier (:;-;^), It acts to identify the unit immediately below. The decoder 6 comprises: • an electronic picker 10 adapted to read and write data to the 15 media 8; • a filter 1 § 12, Suitable for transferring the mixed-coded audiovisual content to a de-mixing code as a decoder, and transmitting the message ECM-I to a decoder 7 card interface 16 associated with the mixed-coded audiovisual content; and A decoder and decoder 14. 2 is purely unintentional. In this example, the decoder 6 includes a receiver adapted to receive the content of the mixed audiovisual content through the wireless data transmission network. And the ECM messages associated with the audiovisual content. For example, the shuffled audiovisual content and the ECM messages are transmitted by a remote transmitter 24 to a plurality of remote terminals such as the terminal 2. 200834441 Terminal 2 also has a security processor 30' that is connected to the decoder 6. This security processing The 30 series is designed to handle the ECM messages and EMM messages (rights management messages) and the encoding and decoding operations required to perform the operations of the terminal 2. 5 For this purpose, the processor 30 comprises: • an interface 32, adapted to cooperate with the interface 16 of the decoder to receive ECM and EMM messages therefrom; • a computer 34 adapted to process the EMM and ECM messages received via the interface 32; 10 • Non-volatile The memory 36, in which various items of data required for the encoding/decoding operations are also stored; and a volatile memory 38 to which temporary processing results are stored. For example, the processor 30 It is a mobile processor such as a smart card. 15 The memory 36 contains:
•一獨特識別符UA給該保全處理器30,致能該處理器 30可從所有其他可能被使用於該解碼器6之保全處理器中 被辨別出來;並且 •三個不同演算法Algol、Algol和Algo3,每一者係作 20 用來計算已發生觀看次數。 針對該密碼上下文之每個識別符,該記憶體36亦包含 下列資訊: •存取權利TdA,用以與包含在一ECM訊息中之該等 存取條件CdA比較,已判定該ECM訊息是否可以被該處理 19 200834441 器30處埋; • 一列表CAR’用以防止一許可證之重新使用的;以 及 • 一密碼鍵Κρ用以致能為了處理該等eCM和emm訊 5息所需而將被執行之該等編碼和解碼操作。 第6圖顯不一架構範例,其有可能被用於該列表CAr。 藉由範例,該列表包含有包含該等識別符C〇ntent_jd之一第 一行,以及包括與該識別符c〇ntent_Id相關聯之該識別符 C-Anti一Reuse的一第二行。該列表CAJl包含與已被該讀取 10 機10讀取之許可證一樣多的列。 翁 该圮憶體36亦包括一表格TabIncrement,用以與該演算 法Alg〇3 —起使用。藉由範例,該表格TabIncremem係如下 面所示:• A unique identifier UA is given to the security processor 30, enabling the processor 30 to be discerned from all other security processors that may be used by the decoder 6; and • three different algorithms Algol, Algol And Algo3, each of which is used to calculate the number of views that have occurred. For each identifier of the cryptographic context, the memory 36 also includes the following information: • Access rights TdA for comparing with the access conditions CdA included in an ECM message, whether the ECM message can be determined It is buried by the process 19 200834441; • a list CAR' is used to prevent reuse of a license; and • a password key Κ ρ is used to enable the processing of the eCM and emm messages These encoding and decoding operations are performed. Figure 6 shows an architectural example that may be used for this list CAr. By way of example, the list includes a first line containing one of the identifiers C〇ntent_jd and a second line including the identifier C-Anti-Reuse associated with the identifier c〇ntent_Id. The list CAJl contains as many columns as the licenses that have been read by the read machine 10. Weng's memory 36 also includes a table, TabIncrement, for use with the algorithm Alg〇3. By way of example, the table TabIncremem is shown below:
此表格的第一列X包含整數,其每一者對應至一片段已 被續取之次數。該第二列Y聯結那些整數之每一者至一增額 應被觀察到的是在此範例中,該增額級距係一片段 、貝取一人數之一單調遞減(monotonically decreasing)函 數忒列Z提供針對一片段每一讀取號碼,該演算法實際列 20入考量之數字。 最後,該終端機2包括一遙控40,其致能該解碼器6去 ^〜無線鏈路42被控制。為了簡化解釋,該遙控4〇只有 20 200834441 下列按紐被顯不· •一按鈕44,作用來引發一視聽内容的讀取,該視聽 内容係選自紀錄於該媒體8中之各種視聽内容; •一按鈕45,其致能伊視聽内容的讀取被停止,例如, 5用以切換到讀取其他視聽内容,或者僅僅為了停止所有的 讀取; •一按鈕46,其用以往回跳躍,亦即,用以從目前正 在讀取之片段直接跳到一個先前片段,而不用為了這個目 的非得讀取位於目前正在讀取之片段與該先前片段之間的 10 中間片段;以及 •一按鈕47,其用以往前跳躍,亦即,允許由目前正 在讀取之片段直接換到一較晚片段,而不需要非得讀取位 於目前正在讀取之片段與該較晚片段之間的中間片段。 5亥終、機2之操作將參照第7圖的方法描述如下。最 15初,在一步驟期間,該傳輸器24透過該網路2〇傳送一被 拌碼視聽内容和其對應ECM訊息至該終端機2。在一步驟72 期間,該終端機2記錄該被拌碼視聽内容和該對應ECM訊息 於該媒體8上,例如以用來取得該被從取視聽内容CAN1i 方法。 20 此後,在一步驟74期間,該傳輸器24透過該網路2〇或 者透過其他模式的通訊,傳輸該許可證!^至該終端機2。這 是該許可證之原始版本,而且特定地,它包含了該内容被 允許辜看的次數NVA之原始數值。較佳地,該原始數值致 能該内容被完整的觀看至少兩次。舉例而言,在步驟74期 21 200834441 間,該許可證係被傳輸於一EMM_U訊息中,該ΕΜΜ_Ι^Κ 息係顯示於第8圖之架構。更確切地,此EMMJJ訊息之架 構在傳輸被拌碼多媒體信號領域中,遵循上述標準Ute C90-007。在第8圖中,只有顯示為理解下文描述所需之那 5 些元件。 更確切地,該EMM一U訊息具有與參照第4圖描述於上 文者相同的攔位,因此無需在此再次詳細描述它們。 在一步驟76期間,只有具有對應至包含在該 息之一識別符UA之該保全處理器的那個終端機2紀錄該被 10 接收取可證於該媒體8。 應被理解的是該許可證可在該内容之前被傳送,或者 可與該内容同時被傳送,而同樣地,它可比該内容先或者 同時被紀錄於該媒體8。因此,步驟70和步驟74,同樣地還 有步驟72和步驟76,可為同時或者交替,只要步驟72和步 15 驟76各自維持在比步驟70和步驟74之後即可。The first column X of this table contains integers, each of which corresponds to the number of times a segment has been renewed. The second column Y is associated with each of the integers to an increment that should be observed. In this example, the increment is a monotonically decreasing function. Z provides a number for each segment of a segment, and the algorithm actually lists 20 numbers. Finally, the terminal 2 includes a remote control 40 that enables the decoder 6 to be controlled by the wireless link 42. In order to simplify the explanation, the remote control only has 20 200834441. The following buttons are displayed: • a button 44, which acts to trigger the reading of an audiovisual content selected from various audiovisual contents recorded in the medium 8; • A button 45 that enables the reading of the audiovisual content to be stopped, for example, 5 to switch to reading other audiovisual content, or simply to stop all readings; • a button 46 that uses the previous back jump, That is, to jump directly from a segment currently being read to a previous segment, without having to read 10 intermediate segments between the segment currently being read and the previous segment for this purpose; and • a button 47 It uses the previous jump, that is, allows the segment currently being read to be directly switched to a later segment without having to read the intermediate segment between the segment currently being read and the later segment. The operation of the 5th end and the machine 2 will be described below with reference to the method of Fig. 7. Initially, during a step, the transmitter 24 transmits a coded audiovisual content and its corresponding ECM message to the terminal 2 via the network. During a step 72, the terminal 2 records the coded audiovisual content and the corresponding ECM message on the medium 8, for example, to obtain the method of taking the audiovisual content CAN1i. Thereafter, during a step 74, the transmitter 24 transmits the license to the terminal 2 via the network 2 or through other modes of communication. This is the original version of the license and, in particular, it contains the original number of NVAs for which the content was allowed to be viewed. Preferably, the original value enables the content to be viewed completely at least twice. For example, during step 74, 21 200834441, the license is transmitted in an EMM_U message, which is shown in the architecture of Figure 8. More specifically, the architecture of this EMMJJ message follows the above-mentioned standard Ute C90-007 in the field of transmitting coded multimedia signals. In Figure 8, only the five components required to understand the description below are shown. More specifically, the EMM-U message has the same block as described above with reference to Fig. 4, so that it is not necessary to describe them again in detail herein. During a step 76, only the terminal 2 having the security processor corresponding to the one of the identifiers UA is recorded to record the receipt of the media 8 . It should be understood that the license may be transmitted prior to the content or may be transmitted concurrently with the content, and as such, it may be recorded on the media 8 prior to or simultaneously with the content. Thus, steps 70 and 74, as well as steps 72 and 76, may be simultaneous or alternating as long as step 72 and step 76 are each maintained after steps 70 and 74.
隨後,該終端機2之使用者誘發被紀錄在該媒體8上之 該等視聽内容之一者地讀取,例如透過使用該遙控4〇。在 此範例中,被假設的是它正在讀取被誘發之内容CANl。接 著,一個稱作期間開端(session opening)之階段80開始。 20 最初,在一步驟82期間,如果多數許可證為了相同視 聽内容而存在的話,該使用者選擇要使用哪一許可證來觀 看内容。在此範例中’該許可證L!係被自動選擇,因為這 是唯一與該内容CAN〗相關聯之許可證。 此後,在一步驟84期間,該終端機透過該等界面16和 22 200834441Subsequently, the user of the terminal 2 induces reading of one of the audiovisual contents recorded on the medium 8, for example by using the remote control. In this example, it is assumed that it is reading the induced content CANl. Next, a phase 80 called session opening begins. 20 Initially, during a step 82, if a majority of the license exists for the same audiovisual content, the user selects which license to use to view the content. In this example, the license L! is automatically selected because this is the only license associated with the content CAN. Thereafter, during a step 84, the terminal transmits through the interfaces 16 and 22 200834441
32傳送該被選擇許可證至該處理器3〇。為了這個目的,該 解馬uu傳送代表該許可證之該emm一U訊息,該EMM_U 説息與第8圖所示者相同。 在一步驟86期間,該處理器3〇驗證包含在該被接收 —5 EMM一U訊息中之該識別符UA與紀錄於該記憶體3 6中之該 識別符UA相對應。例如,在步驟86期間,該處理器30驗證 該識別符UA是否相同。 ^ 如果是的話,它接著著手一步驟88,在其期間該處理 器30借助於該密碼冗餘l—反去驗證該被接收許可證之真實 10性。更確切地,在步驟88期間,該處理器30對該被接收取 可證之該等欄位之該内容執行類似於先前執行之操作,以 取得冗餘L—R。特定地,在步驟88期間,該等操作之至少一 者包括有使用一岔碼鍵來編碼或者解碼。例如,使用於密 碼冗餘之密碼鍵係被下者識別··包含在該息之該 15 SOID欄位中之中的該上下文識別符。如果被該處理器如執 行之该岔碼冗餘處理導致一正面效果的話,例如,如果被 : 該處理器30構成之該冗餘係與包含在該攔位L—R之該冗餘 相同的話,那麼該許可證係被視為真實且誠實的,而該處 理斋接者執行步驟90。 20 在步驟90期間,該處理器30搜尋該識別符 C—Anti_Reuse,其與包含在該被接收許可證中之該識別符 Content_Id相關聯。 如果該列表CAR中,沒有識別符對應至被接收識別符32 transmits the selected license to the processor 3〇. For this purpose, the solution uu transmits the emm-U message representing the license, and the EMM_U is the same as that shown in Fig. 8. During a step 86, the processor 3 verifies that the identifier UA included in the received -5 EMM-U message corresponds to the identifier UA recorded in the memory 36. For example, during a step 86, the processor 30 verifies that the identifier UA is the same. ^ If so, it proceeds to a step 88 during which the processor 30 verifies the authenticity of the received license by means of the cryptographic redundancy. More specifically, during a step 88, the processor 30 performs an operation similar to that previously performed on the content of the fields that are received for verification to obtain redundancy L-R. Specifically, during step 88, at least one of the operations includes encoding or decoding using a weight key. For example, the cipher key used for cryptographic redundancy is identified by the next one of the context identifiers included in the 15 SOID field of the message. If the code redundancy processing performed by the processor causes a positive effect, for example, if: the processor 30 constitutes the redundancy system and the redundancy included in the barrier L-R is the same Then, the license is considered to be true and honest, and the process is performed by step 90. 20 During a step 90, the processor 30 searches for the identifier C_Anti_Reuse, which is associated with the identifier Content_Id included in the received license. If there is no identifier in the list CAR, it corresponds to the received identifier.
Content—Id的話,那麼該處理器30會執行一步驟92,步驟92 23 200834441 增加該被接收識別符Content_Id至該列表0八11,並且把該識 別符聯繫至具有一原始數值為零之一識別符 C Anti Reuse。 否則,在一步驟94期間,該處理器30比較該被接收許 5 可證之該識別符T_Anti_Reuse的數值和與該該列表CAR中If Content-Id, then the processor 30 performs a step 92, step 92 23 200834441 adds the received identifier Content_Id to the list 0-8, and associates the identifier to have one of the original values of zero. C Anti Reuse. Otherwise, during a step 94, the processor 30 compares the value of the identifier T_Anti_Reuse that was received and verified with the list CAR
之該識別符Content_Id相關聯之該識別符C_Anti_Reuse的 數值。如果該等識別符相對應的話,例如,如果其等數值 相當的話,接著,在步驟96期間,該處理器30驗證包含在 該被接收許可證中之該數字NVA係完全大於零。如果是的 10 話,隨後在一步驟98期間,該處理器30儲存下列資料於其 記憶體38内:包含在該欄位Params中之該等參數、數字NVA 和NVC、以及包含在該被接收許可證之該表格丁沾。 如果在步驟86、88、94或者96期間執行的驗證有一者 失敗的話,那麼該處理器30會隨即進行一步驟,其中它 15停止處理該被接收許可證,而且停止解碼該被拌碼視聽内 容0 在步驟98結束時,該階段80即完成,而讀取該視聽内 容之一階段104自動開始。 在階段104的開始,在一步驟1〇6期間,該視聽内容 2〇 CAN!之該第一片段CAN-1係被讀取並且被傳輸至該解拌 碼器14。同時,在一步驟108期間,該相關聯訊息ECM一1 係被傳輸至該處理器30。 此後,在一步驟110期間,包含在該訊中之該 等存取條件CdA係被與包含在該記憶體36中之該存取權利 24 200834441The identifier Content_Id is associated with the value of the identifier C_Anti_Reuse. If the identifiers correspond, for example, if their values are equal, then, during a step 96, the processor 30 verifies that the digital NVA contained in the received license is completely greater than zero. If yes, then during a step 98, the processor 30 stores the following data in its memory 38: the parameters contained in the field Params, the numbers NVA and NVC, and the inclusions received therein. The form of the permit is dip. If the verification performed during step 86, 88, 94 or 96 fails, then the processor 30 will immediately perform a step in which it 15 stops processing the received license and stops decoding the mixed content audiovisual content. 0 At the end of step 98, the phase 80 is completed and the phase 104 of reading the audiovisual content is automatically started. At the beginning of stage 104, during a step 〇6, the first segment CAN-1 of the audiovisual content 2〇CAN! is read and transmitted to the demultiplexer 14. At the same time, during a step 108, the associated message ECM-1 is transmitted to the processor 30. Thereafter, during a step 110, the access conditions CdA included in the message are associated with the access rights included in the memory 36 200834441
TdA相比較。當該等存取條件對應至該存取權利TdA時,那 麼該方法繼續進行一步驟112,在步驟112中包含在該被接 收訊息ECM一 1中之該識別符CJd係被取得。 而後,在一步驟114期間,該處理器3〇對該被接收表格 5 Tab中對應至該被取得識別符C—Id之單格,增額指定尺寸的 一級距。在此範例中,該指定級距尺寸取決於該參數 Algo_Id。該步驟114只有在該單格還沒有達到被該識別符 C_Id所指定之最大尺寸時,才會被執行。 在一步驟116期間’該處理器30亦對該數字NCV增額一 10 指定級距。 隨後,在一步驟120期間,該處理器判定該視聽内容是 否已經又被觀看另一次了。這是透過執行與該識別符 Algo一Id相對應之該演算法來被完成。對應至該等識別符 Algo卜Algo2和Algo3之該等演算法係各別參照第9圖至第 15 11圖來被描述。 如果該内容已經又被觀看過一次的話,該處理器接著 著手一步驟122,在其期間,該數字NVA是被增額,而且如 果必要的話,該表格Tab和該數字NVC係被更新。 在一步驟124期間,該處理器3〇驗證該數字NVA是否完 20全比零大。如果該數字NVA仍然完全比零大的話,那麼在 一步驟126期間’該處理器著手取得在該被接收訊息ecm_1 中之該密碼CW*,而且接著用儲存在該上下文中與該攔位 S0ID之内容相關聯之一解碼鍵解碼該密碼。隨後,在一步 驟128期間,該被解碼控制鍵CW係被傳輸致該解拌碼器 25 200834441 14 〇 如果在步驟110期間,該被接收存取條件不符合該被儲 存存取權利的話,或者如果在步驟124期間,該數字nva比 零少或者等於零的話,那麼該處理器3〇馬上著手一步驟 5 130,其停止處理被接收訊息』復」。因此,沒有新的㈣ 字CW會被提供至該解拌碼器,藉而防止正當解摔碼被紀錄 於該媒體8之該視聽内容。 如果在步驟120期間,發現沒有發生新的觀看的話,那 麼該方法會直接從步驟12〇跑到步驟126。 10 纟步驟128結束時,該解摔碼器14透過使用⑽接收自 該處理器30之該控制自,解拌碼該片段CANj。隨後,在 一步驟134期間,該被解拌碼片段係被清楚地顯示於該螢幕 4上。 在步驟134結束時,該方法自動返回步驟1〇6和步驟 15 1〇8,以讀取視該聽内容CAN#下來的片段。 當沒有按鈕46和47來引發向前或者向後的跳躍時,針 對該内容CAN!之該等片段CAN1 一I之每一者,該等步驟1〇6 至13 4係按照該專片段之順序重新被執行。 在該階段104期間,該使用者亦可利用該等按鈕糾和叼 20往回或者往别跳躍。在這樣的條件下,該内容CAN!之該等 片段係不再以規定的順序被讀取。儘管如此,該等步驟1〇6 到134繼續被應用於每一個被讀取之片段。換句話說,使用 該等按鈕46和47不會使目前讀取期間(sessi〇n)結束。 在該視聽内谷已經被觀看之後,該使用者可決定要結 26 200834441 束觀看,例如透過按下該按鈕45。在那片刻,該處理器30 接著進行一階段140,來結束該目前期間 (session )。在階 段140的開始,在一步驟142期間,該處理器30增額形成該 識別符C—Anti—Reuse之數字,該識別符c_Anti_Reuse係與 5在該列表CAR中之該識別符c〇ntent_Id相關聯。在此之後, 在一步驟144期間,該處理器產生一剛更新許可證,亦即, 該被更新终可證包含該等數字NVA、NCV、T_Anti_Reuse 和Tab之新數值,還有一重新形成數值!^^。 在該被更新許可證中之該識別符T_Anti_Reuse之數值 10係與下者相同:與該列表CAR中之該識別符c〇ntent_Id相關 聯知該識別符C_Anti_Reuse。 該冗餘L_R係被從該取可證中之新數值所構成,且係 藉由使用儲存於與該識別符S0ID相關聯之該上下文中適 當密碼鍵。 15 此後,在一步驟146期間,該處理器3〇將該被更新許可 證1^轉送給該解碼器6,其儲存它來代替之前儲存在該媒體 8上的該許可證。 下文描述有三個演算法的範例,其等係用來計算觀看 次數,且係適用於被實施在步驟120中。每一演算法係被指 20定到包含在該許可證中之該參數Algo〜Id的一特定數值。 第9圖代表用來計算已發生觀看次數之演算法Alg〇1。 該演算法Algol使用包含在該許可證中之兩個參數,亦即該 臨界值Sju該參數C—Size。為了執行該演算法Aig〇卜該參 係被設定為一位元。 27 200834441 在該演算法Algol的實行期間’在一步驟i5〇期間,該 處理裔30檢测该視聽内容ί買取中的一不連續性 (discontinuity)。舉例而言,這個不連續性之檢測可係經 由響應該等按紐46和47被按下的一者。該不連續性亦可透 5過觀察包含在該被接收訊息ECM_i中之該等識別符c_Id之 數值中的不連續性。 此後,當這樣一種不連續性被檢測時,在一步驟152 期間,該處理器30將該視聽内容視為已在一新的時機被觀 看過,如果在該表格Tab中包含一「1」的單格數量大於或 10 者專於一臨界值Si。如果如此的話,在步驟122期間,該數 字NVA係被減額1,而且該表格中Tab的所有單格係被重新 啟始化為零這個數值。 當達到該視聽内容之最後片段的結尾,該步驟152也會 被自動執行。 15 該演算法Algol允許一尺寸被該臨界值81限制之内容部 分被反覆觀看,但是當該内容之該被觀看部分的尺寸大於 該臨界值時會限制觀看次數。 第1〇圖代表用來計算已發生觀看次數之該演算法 Alg〇2。該演算法Algo2利用包含在該許可證中之該等參數 20 C—Size、S+S】。 在一步驟160期間,例如與步驟150,該視聽内容讀取 之一不連續性係被檢測。響應其,在一步驟162期間,如果 該表袼Tab中包含一「1」的單格數量大於該臨界值Si,或 者如果該數字NCV大於或等於該臨界值S2的話,會判定觀 28 200834441 看已經在一新場合中發生了。 在該步驟122期間,當被判定一新觀看已發生或者該最 後片段已被讀取時,該數字NVA會被減額1,而該表格Tab 之所有單格和該數字NVC之數值會被重新啟始化為零這個 5 數值。 該演算法Alg〇2不同於該演算法Algol在於其利用該臨 界值S2之使用去限制該内容之一有限片段的觀看。 第11圖代表該演算法Algo3。該演算法Algo3使用該被 接收許可證之該等參和S2。此外,該演算法Algo3 10之該識別符通知該處理器30在步驟116使用之增額級距係 由該表格Tab判定。 隨後’在一步驟170期間,該處理器30檢測該視聽内容 之觀看過程中的一不連續性。接著,響應於如此的一個檢 測或者在該最後片段觀看之結束時,在一步驟172期間,如 15果該數字NCV大於臨界值I,會判定一新觀看已發生。如 此是的話,那麼在步驟122期間,該數字NVA在被減額1, 而該數字NCV和該祕τ权财單㈣會被重新啟始化 為零。應被觀察的是在此第三種演算法中當一片段被觀看 第-人纷,該數+ NCV係被增額1。相反地,當同一片段被 20觀看第二次時,該數字NCV只會被増額〇 5。那麼如果相同 片段被觀看更多次的話,在該步驟i 16期間所使用之增加會 更小。因此’藉由這種技術,-特定片段之隨後觀看被給 予的重要性較第一次觀看低。 還有許多其他實施是可行的。例如,該許可證可被自 29 200834441 該傳輸器傳輸至該解碼器,而後透過使用除7EMM u訊息 以外之其他訊息,從該解碼器傳送至該保全處理器。例如, 任何簽字資料架構都可被使用。 該保全處理器30在上文中被描述為一可移動處理器。 在一變化中,該處理器30可被整合至該解碼器6中,並且被 永久的合併在其中。 在一變化中,该許可證不包含該攔位L—R,而因此不 被一簽名所保護。 當每一視聽内容只有一許可證時,該攔位L—μ可省略。 當同一視聽内容可存在著多數許可證時,那麼將被使 用之許可證許可被自動選擇。舉例而言,可能會優先使用 最舊的許可證。 在此範例中,每一片段對應至一密碼週期 (crytoperiod)。在一變化中,一片段可對應至多數連續密 15碼週期。在這種情況下,多數ECM__i訊息將包括相同的識 別符Cjd。 在另一實施中,垓表格Tab之單格可被減額而非增額。 在該表格Tab從不重新啟始化之實施中,該欄位NCV可 被省略。 對於記錄在該媒體8上之多數視聽内容,該許可證也可 為通用的。在這種情況下’該識別符Content_Id不識別一單 一視聽内容,而是識別可透過該終端機2被觀看之一組視聽 内容。 第7A-7B圖之方法之某些步驟可被交換。例如,步驟110 30 200834441 可在步驟124之後進行。 在這種情況下,監控已發生觀看次數會在每一片段被 讀取之後進行。在一變化中,監控可僅僅在該讀取期間 (session)結束時被進行。因此,在此實施中,沒有什麼 • 5會阻止一使用者在一單一期間中觀看一目前視聽内容如他 所欲的多次。然而,該期間的次數是被限制的。 在是化中,被該演算法使用之該增額級距可由該 ECM訊息之—參數所提供,以考量到針對該内容之不同部 分感興趣程度的不同。 10 職體8可為—可移祕體,例如—可重寫數位視訊光 碟(DVD-RW)或者__可重寫光碟(CD_Rw)。其可為一不 得重寫之可移動媒體(DVD_R、CD_R),在此情況下,該 許可證係被儲存於該電子讀取器之一非易失性記憶體中。 上述關於視聽内容之說明亦可適用於單單只是音頻而 15 沒有視訊的内容。 籲 述關於』示—視聽内各之描述亦可應用來該内容在 - 一局部地區或者本地網路之被控制重新分布 (redistribution) 〇 【圖式簡單說明】 20第1圖係一圖式’其顯示用以讀取被記錄數位視聽内容 之一終端機; 第2圖係-圖式’其代表可使用第i圖之該終端機被觀 看之視聽内容; 第3圖係-圖式,其代表與第2圖之該視聽内容一起被 31 200834441 記錄之一權利控制信息(ECM); 第4圖係一圖式,其代表使用在第1圖之終端機中的一 許可證; 第5圖代表包含在第4圖許可證中的一表格之架構; _ 5 第6圖代表包含在第1圖終端機之一保全處理器中的一Comparison of TdA. When the access conditions correspond to the access rights TdA, then the method continues with a step 112 in which the identifier CJd included in the received message ECM-1 is obtained. Then, during a step 114, the processor 3 increments the first level of the specified size for the single cell corresponding to the acquired identifier C_Id in the received form 5 Tab. In this example, the specified step size depends on the parameter Algo_Id. This step 114 is only executed if the cell has not reached the maximum size specified by the identifier C_Id. During a step 116, the processor 30 also increments the digital NCV by a specified level of 10. Subsequently, during a step 120, the processor determines if the audiovisual content has been viewed another time. This is done by executing the algorithm corresponding to the identifier Algo-Id. The algorithms corresponding to the identifiers Algob Algo2 and Algo3 are each described with reference to Figures 9 through 1511. If the content has been viewed again once, the processor proceeds to a step 122 during which the digital NVA is incremented and, if necessary, the table Tab and the digital NVC are updated. During a step 124, the processor 3 verifies that the digital NVA is 20 or more than zero. If the digital NVA is still completely greater than zero, then during a step 126 'the processor proceeds to retrieve the password CW* in the received message ecm_1 and then stores it in the context with the block S0ID The content associated with one of the decode keys decodes the password. Subsequently, during a step 128, the decoded control key CW is transmitted to the descrambler 25 200834441 14 if the received access condition does not comply with the stored access right during step 110, or If, during step 124, the number nva is less than zero or equal to zero, then the processor 3 immediately proceeds to a step 5130, which stops processing the received message. Therefore, no new (four) word CW will be provided to the descrambler, thereby preventing the proper copy code from being recorded on the audiovisual content of the medium 8. If, during step 120, no new viewing has occurred, then the method proceeds directly from step 12 to step 126. 10 纟 At the end of step 128, the descrambler 14 decodes the segment CANj by using (10) the control received from the processor 30. Subsequently, during a step 134, the deserialized code segments are clearly displayed on the screen 4. At the end of step 134, the method automatically returns to step 1〇6 and step 15 1〇8 to read the segment from the listening content CAN#. When there are no buttons 46 and 47 to cause a forward or backward jump, for each of the segments CAN1-I of the content CAN!, the steps 1〇6 to 13 4 are re-ordered according to the sequence of the special segments. Executed. During this phase 104, the user can also use the buttons to correct the 叼 20 back or jump. Under such conditions, the segments of the content CAN! are no longer read in the prescribed order. Nonetheless, these steps 1〇6 through 134 continue to be applied to each segment being read. In other words, the use of the buttons 46 and 47 does not end the current read period (sessi〇n). After the viewing valley has been viewed, the user may decide to view the 2008 200841 bundle, for example by pressing the button 45. At that moment, the processor 30 then proceeds to a stage 140 to end the current session. At the beginning of stage 140, during a step 142, the processor 30 increments to form a number of the identifier C_Anti_Reuse, the identifier c_Anti_Reuse being associated with the identifier c〇ntent_Id in the list CAR Union. Thereafter, during a step 144, the processor generates a just-updated license, i.e., the updated final certificate includes new values for the numbers NVA, NCV, T_Anti_Reuse, and Tab, and a re-formed value! ^^. The value 10 of the identifier T_Anti_Reuse in the updated license is the same as the following: the identifier C_Anti_Reuse is associated with the identifier c〇ntent_Id in the list CAR. The redundant L_R is formed from the new value in the voucher and is used by using the appropriate cipher key stored in the context associated with the identifier S0ID. 15 Thereafter, during a step 146, the processor 3 transfers the updated license 1 to the decoder 6, which stores it in place of the license previously stored on the media 8. An example of three algorithms is described below, which are used to calculate the number of views and are suitable for being implemented in step 120. Each algorithm is assigned 20 to a specific value of the parameter Algo~Id contained in the license. Figure 9 represents the algorithm Alg〇1 used to calculate the number of views that have occurred. The algorithm Algol uses the two parameters contained in the license, i.e., the threshold Sju, the parameter C-Size. In order to execute the algorithm Aig, the parameter is set to one bit. 27 200834441 During the implementation of the algorithm Algol, during a step i5, the processor 30 detects a discontinuity in the purchase of the audiovisual content ί. For example, the detection of this discontinuity may be by one of the buttons that are pressed in response to the buttons 46 and 47. The discontinuity can also be used to observe discontinuities in the values of the identifiers c_Id included in the received message ECM_i. Thereafter, when such a discontinuity is detected, during a step 152, the processor 30 regards the audiovisual content as having been viewed at a new time, if a "1" is included in the table Tab. The number of cells is greater than or 10 is specific to a critical value Si. If so, during step 122, the numeric NVA is decremented by one, and all of the tabs of the Tab in the table are re-initiated to zero. This step 152 is also automatically performed when the end of the last segment of the audiovisual content is reached. 15 The algorithm Algol allows a portion of the content whose size is limited by the threshold 81 to be viewed repeatedly, but the number of views is limited when the size of the viewed portion of the content is greater than the threshold. The first diagram represents the algorithm Alg〇2 used to calculate the number of views that have occurred. The algorithm Algo2 utilizes the parameters 20 C-Size, S+S included in the license. During a step 160, such as with step 150, one of the discontinuities of audiovisual content reading is detected. In response to this, during a step 162, if the number of cells containing a "1" in the table Tab is greater than the threshold Si, or if the number NCV is greater than or equal to the threshold S2, it is determined 28 2834441 It has happened in a new occasion. During this step 122, when it is determined that a new viewing has occurred or the last segment has been read, the number NVA will be decremented by one, and all the cells of the table Tab and the numerical value of the number NVC will be restarted. Initialize to this 5 value. The algorithm Alg〇2 differs from the algorithm Algol in that it uses the use of the threshold value S2 to limit the viewing of a limited segment of the content. Figure 11 represents the algorithm Algo3. The algorithm Algo3 uses the same reference S2 of the received license. In addition, the identifier of the algorithm Algo3 10 notifies the processor 30 that the increment level used in step 116 is determined by the table Tab. Then, during a step 170, the processor 30 detects a discontinuity in the viewing of the audiovisual content. Then, in response to such a test or at the end of the last segment view, during a step 172, if the digital NCV is greater than the threshold I, a new view is determined to have occurred. If so, then during step 122, the digital NVA is decremented by one, and the digital NCV and the secret vouchers (four) are reinitialized to zero. It should be observed that in this third algorithm, when a segment is viewed, the number + NCV is incremented by one. Conversely, when the same segment is viewed 20 times for the second time, the digital NCV will only be 増5. Then if the same segment is viewed more times, the increase used during this step i 16 will be smaller. Thus, by this technique, subsequent viewing of a particular segment is given less importance than the first viewing. There are many other implementations that are feasible. For example, the license can be transmitted to the decoder from the 2008 200834441 transmitter and then transmitted from the decoder to the security processor using messages other than the 7EMM u message. For example, any signature data structure can be used. The security processor 30 is described above as a mobile processor. In a variation, the processor 30 can be integrated into the decoder 6 and permanently incorporated therein. In a variant, the license does not contain the intercept L-R and is therefore not protected by a signature. When there is only one license for each audiovisual content, the block L_μ can be omitted. When there are a large number of licenses for the same audiovisual content, the license license to be used is automatically selected. For example, the oldest license may be preferred. In this example, each segment corresponds to a password period (crytoperiod). In one variation, a segment may correspond to a majority of consecutive dense 15 code periods. In this case, most ECM__i messages will include the same identifier Cjd. In another implementation, the single box of the table Tab can be derated rather than incremented. In the implementation of the table Tab that is never re-initialized, the field NCV can be omitted. The license may also be versatile for most audiovisual content recorded on the media 8. In this case, the identifier Content_Id does not recognize a single audiovisual content, but identifies a group of audiovisual content that can be viewed through the terminal 2. Certain steps of the method of Figures 7A-7B can be exchanged. For example, step 110 30 200834441 can be performed after step 124. In this case, monitoring the number of views that have occurred will occur after each segment is read. In a variation, monitoring can only be performed at the end of the session. Therefore, in this implementation, nothing will prevent a user from viewing a current audiovisual content as many times as he desires in a single period. However, the number of times during this period is limited. In the simplification, the increment level used by the algorithm can be provided by the parameters of the ECM message to account for differences in the degree of interest for different parts of the content. 10 The job 8 can be a removable body, for example, a rewritable digital video disc (DVD-RW) or a __ rewritable disc (CD_Rw). It can be a removable medium (DVD_R, CD_R) that cannot be rewritten, in which case the license is stored in one of the non-volatile memories of the electronic reader. The above description of audiovisual content can also be applied to content that is only audio and 15 has no video. The description of the description of the audiovisual can also be applied to the content in a local area or local network controlled redistribution 〇 [schematic description] 20 first picture is a picture ' Displaying a terminal for reading a recorded digital audiovisual content; FIG. 2 is a diagram showing the audiovisual content that can be viewed by the terminal of the first drawing; FIG. 3 is a diagram Representing one of the rights control information (ECM) recorded by 31 200834441 together with the audiovisual content of FIG. 2; FIG. 4 is a diagram representing a license used in the terminal of FIG. 1; Represents the architecture of a table contained in the license in Figure 4; _ 5 Figure 6 represents one of the security processors included in the terminal of Figure 1
Anti_Reuse列表; 第7A圖和第7B圖係實施在第1圖終端機中的一種方法 之流程圖,該方法係用以管理該視聽内容已被觀看之次數; ^ 第8圖係一圖式,其代表一唯一位址權利管理訊息 10 (EMM—U)之架構,其係由第7圖訊息執行期間所產生者; 以及 第9圖至第11圖係流程圖,各別代表三個演算法,其等 係用於計算已發生之觀看次數。 【主要元件符號說明】 2終端機 20無線資料傳輸網路 4螢幕 24遠端傳輸器 6解碼器 30保全處理器 8資料記錄媒體 32界面 10電子讀取器 34計算機 12濾波器 36非易失性記憶體 14解碼器 38易失性記憶體 16解碼器/卡片界面 40遙控 18接收器 42無線鏈路 32Anti_Reuse list; Figures 7A and 7B are flowcharts of a method implemented in the terminal of Figure 1, which is used to manage the number of times the audiovisual content has been viewed; ^ Figure 8 is a diagram, It represents the architecture of a unique address rights management message 10 (EMM-U), which is generated by the execution of the message in Figure 7, and the flowcharts of Figures 9 through 11 representing three algorithms. , etc., is used to calculate the number of views that have occurred. [Main component symbol description] 2 terminal 20 wireless data transmission network 4 screen 24 remote transmitter 6 decoder 30 security processor 8 data recording medium 32 interface 10 electronic reader 34 computer 12 filter 36 non-volatile Memory 14 decoder 38 volatile memory 16 decoder / card interface 40 remote control 18 receiver 42 wireless link 32
200834441 44按紐 45按紐 46按紐 47齡丑 70步驟 72步驟 74步驟 76步驟 80階段 82步驟 84步驟 86步驟 88步驟 90步驟 92步驟 94步驟 96步驟 98步驟 100步驟 104階段 106步驟 108步驟 110步驟 112步驟 114步驟 116步驟 120步驟 122步驟 124步驟 126步驟 128步驟 130步驟 132步驟 134步驟 140階段 142步驟 144步驟 146步驟 150步驟 152步驟 160步驟 162步驟 33 200834441 170步驟 172步驟200834441 44 button 45 button 46 button 47 ugly 70 step 72 step 74 step 76 step 80 stage 82 step 84 step 86 step 88 step 90 step 92 step 94 step 96 step 98 step 100 step 104 stage 106 step 108 step 110 Step 112 Step 114 Step 116 Step 120 Step 122 Step 124 Step 126 Step 128 Step 130 Step 132 Step 134 Step 140 Stage 142 Step 144 Step 146 Step 150 Step 152 Step 160 Step 162 Step 33 200834441 170 Step 172 Step
Claims (1)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| FR0611194A FR2910671B1 (en) | 2006-12-21 | 2006-12-21 | METHOD FOR MANAGING THE NUMBER OF VISUALIZATIONS, SECURITY PROCESSOR AND TERMINAL FOR THIS METHOD |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TW200834441A true TW200834441A (en) | 2008-08-16 |
| TWI448979B TWI448979B (en) | 2014-08-11 |
Family
ID=38308610
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW096146796A TWI448979B (en) | 2006-12-21 | 2007-12-07 | A method of managing number of views, a security processor, and a terminal for performing the method |
Country Status (9)
| Country | Link |
|---|---|
| US (1) | US20090316896A1 (en) |
| EP (1) | EP2098073B1 (en) |
| KR (1) | KR101378487B1 (en) |
| CN (1) | CN101563920B (en) |
| ES (1) | ES2753848T3 (en) |
| FR (1) | FR2910671B1 (en) |
| PL (1) | PL2098073T3 (en) |
| TW (1) | TWI448979B (en) |
| WO (1) | WO2008096066A2 (en) |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103248918B (en) * | 2013-05-16 | 2015-12-02 | 浙江科技学院 | The DVB condition dispensing device of integrated master data, normal data scrambling |
| CN104850605A (en) * | 2015-05-05 | 2015-08-19 | 天脉聚源(北京)教育科技有限公司 | Method and apparatus for displaying notes in fast-forwarded note file |
| FR3078223A1 (en) * | 2018-02-16 | 2019-08-23 | Orange | RECEIVING FLOW REPRESENTATIVE OF MULTIMEDIA CONTENT |
Family Cites Families (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7562392B1 (en) * | 1999-05-19 | 2009-07-14 | Digimarc Corporation | Methods of interacting with audio and ambient music |
| US6564253B1 (en) * | 1999-05-07 | 2003-05-13 | Recording Industry Association Of America | Content authorization system over networks including searching and reporting for unauthorized content locations |
| US7310810B1 (en) * | 1999-05-19 | 2007-12-18 | Sony Corporation | Broadcasting apparatus and method, receiving apparatus and method, and medium |
| WO2001047266A2 (en) * | 1999-12-22 | 2001-06-28 | Koninklijke Philips Electronics N.V. | Conditional access system |
| EP1182874A1 (en) * | 2000-08-24 | 2002-02-27 | Canal+ Technologies Société Anonyme | Digital content protection system |
| CN1633794A (en) * | 2000-10-26 | 2005-06-29 | 通用器材公司 | ECM and EMM distribution for multimedia multicast content |
| US7870592B2 (en) * | 2000-12-14 | 2011-01-11 | Intertainer, Inc. | Method for interactive video content programming |
| US8055899B2 (en) * | 2000-12-18 | 2011-11-08 | Digimarc Corporation | Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities |
| US7415440B1 (en) * | 2002-02-22 | 2008-08-19 | Entriq, Inc. | Method and system to provide secure key selection using a secure device in a watercrypting environment |
| FR2837055B1 (en) * | 2002-03-06 | 2004-06-11 | Viaccess Sa | PROTOCOL OF ACCESS CONTROL, BY RANGES OF SPECIFIC HOURS, TO ENRICHED INFORMATION |
| CA2494817A1 (en) * | 2002-08-21 | 2004-03-04 | Disney Enterprises, Inc. | Digital home movie library |
| JP3737798B2 (en) * | 2002-11-25 | 2006-01-25 | 株式会社東芝 | Transmitting apparatus, receiving apparatus and receiving method |
| JP4430882B2 (en) * | 2003-03-19 | 2010-03-10 | 富士通株式会社 | COMPOSITE MEDIA CONTENT CONVERSION DEVICE, CONVERSION METHOD, AND COMPOSITE MEDIA CONTENT CONVERSION PROGRAM |
| CN1755727A (en) * | 2004-09-27 | 2006-04-05 | 清华同方股份有限公司 | Payment method by playing stream for KTV video on demand system and management system thereof |
-
2006
- 2006-12-21 FR FR0611194A patent/FR2910671B1/en not_active Expired - Fee Related
-
2007
- 2007-12-07 TW TW096146796A patent/TWI448979B/en not_active IP Right Cessation
- 2007-12-20 ES ES07872422T patent/ES2753848T3/en active Active
- 2007-12-20 KR KR1020097012997A patent/KR101378487B1/en not_active Expired - Fee Related
- 2007-12-20 WO PCT/FR2007/002137 patent/WO2008096066A2/en not_active Ceased
- 2007-12-20 CN CN2007800469116A patent/CN101563920B/en not_active Expired - Fee Related
- 2007-12-20 US US12/520,339 patent/US20090316896A1/en not_active Abandoned
- 2007-12-20 PL PL07872422T patent/PL2098073T3/en unknown
- 2007-12-20 EP EP07872422.6A patent/EP2098073B1/en not_active Not-in-force
Also Published As
| Publication number | Publication date |
|---|---|
| ES2753848T3 (en) | 2020-04-14 |
| WO2008096066A3 (en) | 2009-03-05 |
| PL2098073T3 (en) | 2020-03-31 |
| US20090316896A1 (en) | 2009-12-24 |
| CN101563920B (en) | 2012-05-02 |
| EP2098073B1 (en) | 2019-08-14 |
| TWI448979B (en) | 2014-08-11 |
| WO2008096066A2 (en) | 2008-08-14 |
| KR101378487B1 (en) | 2014-03-27 |
| EP2098073A2 (en) | 2009-09-09 |
| FR2910671A1 (en) | 2008-06-27 |
| CN101563920A (en) | 2009-10-21 |
| FR2910671B1 (en) | 2009-04-03 |
| KR20090090356A (en) | 2009-08-25 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN103078840B (en) | User management control device | |
| JP4847328B2 (en) | Time authentication apparatus, time authentication method, computer program, recording medium, integrated circuit, and time authentication system | |
| EP1968316A1 (en) | Method to control the access to conditional access audio/video content | |
| US20040068659A1 (en) | Method for secure distribution of digital data representing a multimedia content | |
| RU2316135C2 (en) | Method for controlling access privileges for encrypted data stored in a digital recorder | |
| JP2003535520A (en) | Access control processor | |
| EP1684222A1 (en) | License management method, information processing apparatus, information processing method, and program | |
| CA2590000A1 (en) | Method for transmitting digital data in a local network | |
| US7426494B2 (en) | Rental system | |
| JP4764505B2 (en) | Information transmitter | |
| CN1643915B (en) | Method for securely storing encrypted data on a personal digital recorder | |
| CN1890971A (en) | Conditional access video signal distribution | |
| EP1161828B1 (en) | Enhancing smart card usage for associating media content with households | |
| TW200834441A (en) | A method of managing number of views, a security processor, and a terminal for performing the method | |
| US20040017914A1 (en) | Information reproducing apparatus, information reproducing method, and information reproducing program, and information recording medium on which the information reproducing program is recorded | |
| EP1722567B1 (en) | Content management | |
| JP2006094342A (en) | Server type content providing system, server type content providing device, content using device, server type content providing method and content using method | |
| KR100933262B1 (en) | Method of transmitting digital data representing content | |
| JP2013115815A (en) | Transmission method for push-type video on-demand program and associated decoder | |
| JP2008118205A (en) | Playback apparatus, playback method, and playback system | |
| JP2001223653A (en) | Program receiving terminal device and program providing method | |
| CN100361221C (en) | Broadcast content right protection device and broadcast content right protection method | |
| TWI388213B (en) | Methods for receiving and sending a multimedia content, receiver, sender and recording carrier and security processor for this method | |
| JP5222172B2 (en) | Content reception / playback device | |
| JP2007013685A (en) | Limited reception broadcast IC card and receiving apparatus using the same |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| MM4A | Annulment or lapse of patent due to non-payment of fees |